#What's the difference between machine authentication and the bearer tokens every other secrets manager uses?
A bearer token is a string the workload presents on every API call to prove identity. Anyone who reads the string can present it back and authenticate. Most secrets managers issue these tokens at deploy time and route them through the workload's environment or filesystem.
SikkerKey uses Ed25519 signed requests. Each request carries a signature computed on the machine from a private key that never leaves the host. The signature commits to the method, path, body, timestamp, and a one-time nonce, so it's only valid for that exact call. The next request needs a new signature; nothing about the previous one is reusable.
The practical difference: a bearer token remains a working credential until it expires or is rotated. A signature on a captured request is already invalid by the time anyone reads it, and the private key that produces signatures never leaves the machine. More on the underlying model: machine authentication.